Competitive Intelligence Review最新文献

筛选
英文 中文
Raising the bar of professionalism 提高专业水平
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<37::AID-CIR10>3.0.CO;2-L
Larry L. Hamilton
{"title":"Raising the bar of professionalism","authors":"Larry L. Hamilton","doi":"10.1002/(SICI)1520-6386(199723)8:3<37::AID-CIR10>3.0.CO;2-L","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<37::AID-CIR10>3.0.CO;2-L","url":null,"abstract":"<p>Remarks concluding the Society of Competitive Intelligence Professionals' Symposium on the Economic Espionage Act of 1996: The Impact on Global Competitive Intelligence for Business. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"37"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<37::AID-CIR10>3.0.CO;2-L","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Competitive Intelligence and the corporate jewels 竞争情报与企业珠宝
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<62::AID-CIR13>3.0.CO;2-8
David Mark
{"title":"Competitive Intelligence and the corporate jewels","authors":"David Mark","doi":"10.1002/(SICI)1520-6386(199723)8:3<62::AID-CIR13>3.0.CO;2-8","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<62::AID-CIR13>3.0.CO;2-8","url":null,"abstract":"<p>The end of the Cold War shifted strategic and tactical foreign policy priorities from traditional superpower and client concerns to those reflecting national economic competitiveness, especially commercial and technology-related information. But while the threat of illegal industrial espionage has increased, so too has the new threat of legal—and systematic—competitive intelligence (CI) efforts by foreign and domestic competitors. Corporate efforts to protect proprietary information, the author argues, have tended to follow the classified-protection model developed to thwart clandestine or illegal intelligence operations, leaving firms unprepared to defend against an organized CI collection effort that analyzes information routinely gathered in the course of the target company's daily business activities. Companies must continue to use physical security against illegal threats while redirecting their thinking to CI protection strategies. It is important to realize that your company will and should lose information if it is effectively carrying out its business operations, and to shift from <i>risk avoidance</i> to <i>risk management</i>. The defensive key is to identify what is absolutely critical for the firm's survival or competitiveness—the “corporate jewels”—and then take action to limit their vulnerability to competitor CI collection. The military's five-step Operations Security (OPSEC) approach for assessing risk and establishing countermeasures can be adapted for competitive intelligence. Also, thinking about counterintelligence should move away from the government-clandestine model to an approach based on Counter-Competitor Intelligence (CCI)—seeking to learn during routine CI activities what intelligence activities competitors are directing at your company, and to analyze any damage. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"62-70"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<62::AID-CIR13>3.0.CO;2-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71976508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
How to find market research online 如何在线查找市场调查
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<99::AID-CIR24>3.0.CO;2-P
John McGonagle
{"title":"How to find market research online","authors":"John McGonagle","doi":"10.1002/(SICI)1520-6386(199723)8:3<99::AID-CIR24>3.0.CO;2-P","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<99::AID-CIR24>3.0.CO;2-P","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"99"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<99::AID-CIR24>3.0.CO;2-P","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71923143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The prime directive 基本指令
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<1::AID-CIR1>3.0.CO;2-C
Wayne A. Rosenkrans Jr.
{"title":"The prime directive","authors":"Wayne A. Rosenkrans Jr.","doi":"10.1002/(SICI)1520-6386(199723)8:3<1::AID-CIR1>3.0.CO;2-C","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<1::AID-CIR1>3.0.CO;2-C","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<1::AID-CIR1>3.0.CO;2-C","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71981046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
askSam: The swiss army knife of file management askSam:档案管理的瑞士军刀
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<95::AID-CIR21>3.0.CO;2-1
Tim Powell
{"title":"askSam: The swiss army knife of file management","authors":"Tim Powell","doi":"10.1002/(SICI)1520-6386(199723)8:3<95::AID-CIR21>3.0.CO;2-1","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<95::AID-CIR21>3.0.CO;2-1","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"95-96"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<95::AID-CIR21>3.0.CO;2-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71943600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Competitive Intelligence library 竞争情报库
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<90::AID-CIR20>3.0.CO;2-3
Kathleen J. Johnson
{"title":"Competitive Intelligence library","authors":"Kathleen J. Johnson","doi":"10.1002/(SICI)1520-6386(199724)8:4<90::AID-CIR20>3.0.CO;2-3","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<90::AID-CIR20>3.0.CO;2-3","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"90-93"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<90::AID-CIR20>3.0.CO;2-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When customer's lack of knowledge is your biggest competitive threat 当客户缺乏知识是您最大的竞争威胁时
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<78::AID-CIR12>3.0.CO;2-X
Deborah C. Sawyer
{"title":"When customer's lack of knowledge is your biggest competitive threat","authors":"Deborah C. Sawyer","doi":"10.1002/(SICI)1520-6386(199724)8:4<78::AID-CIR12>3.0.CO;2-X","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<78::AID-CIR12>3.0.CO;2-X","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"78-79"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<78::AID-CIR12>3.0.CO;2-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71974291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using the internet for competitive intelligence: A survey report 利用互联网获取竞争情报:一份调查报告
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<41::AID-CIR7>3.0.CO;2-7
Jean L. Graef
{"title":"Using the internet for competitive intelligence: A survey report","authors":"Jean L. Graef","doi":"10.1002/(SICI)1520-6386(199724)8:4<41::AID-CIR7>3.0.CO;2-7","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<41::AID-CIR7>3.0.CO;2-7","url":null,"abstract":"<p>A survey of CI professionals reveals that the primary use of the Internet in competitive intelligence involves reducing costs and improving the quality of primary and secondary information. However, there is also significant interest among CI practitioners in using the Internet to collect information that will help generate additional revenues, including data related to the development of new products or services. A substantial number of respondents believe that such uses of the Internet can help the company to recognize the value of the CI function. Many CI professionals also are involved in helping create a strategic plan for the Internet and/or developing company or department Web sites. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"41-47"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<41::AID-CIR7>3.0.CO;2-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Doing business in the new world disorder: Assessing, understanding, and effectively responding to the challenges of social and poliltical instability within emerging markets 在新的世界混乱中做生意:评估、理解并有效应对新兴市场社会和政治不稳定的挑战
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<12::AID-CIR4>3.0.CO;2-G
Guntram F. A. Werther
{"title":"Doing business in the new world disorder: Assessing, understanding, and effectively responding to the challenges of social and poliltical instability within emerging markets","authors":"Guntram F. A. Werther","doi":"10.1002/(SICI)1520-6386(199724)8:4<12::AID-CIR4>3.0.CO;2-G","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<12::AID-CIR4>3.0.CO;2-G","url":null,"abstract":"<p>Failure to understand the social and political dynamics of countries and regions is one of the primary causes of business failures within overseas markets. In the past several years, it has cost companies billions of dollars in wasted time, effort, and investment. Succeeding within the “New World Disorder” requires that executives and managers bring new multi-disciplinary skills to their analyses of how societies react to foreign investment and change. Successfully developing areas share specific characteristics that most societies do not possess, and are unlikely to gain within any reasonable time period. In consequence, metropole development—rather than global, regional, or national development—is the rule. A key skill will lie in correctly predicting where growth is likely, and where it is not. Developing useful insights from appropriate analytical skills requires both comparative and case study competencies, a good sense of history, and a commitment to spending as much effort on mastering relevant social, political, and cultural knowledge as one spends on product development. Since the post-Cold War world is very different from the rest of the 20th century, failure to understand the nature and consequences of these differences will generate business failure well into the 21st century. Successful companies will be those that integrate traditional business skills with social science competencies to produce winning analyses of change. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"12-18"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<12::AID-CIR4>3.0.CO;2-G","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Confusing counterintelligence with security can wreck your afternoon 将反间谍与安全混为一谈可能会破坏你的下午
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D
John A. Nolan III
{"title":"Confusing counterintelligence with security can wreck your afternoon","authors":"John A. Nolan III","doi":"10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D","url":null,"abstract":"<p>Typically, there is little linkage between a firm's intelligence collection and security functions. Nevertheless, counterintelligence measures often are relegated to security personnel, if they're thought about at all. But while security seeks to protect a firm's assets by a combination of policies, procedures and practices, counterintelligence, properly understood, aims to engage and neutralize a competitor's collection efforts through a variety of imaginative, flexible, and active measures. An organized counterintelligence approach, such as the Business Intelligence Collection Model<sup>SM</sup> described here, can help ensure CI/counterintelligence integration. This process involves defining what needs to be protected, for how long, and from whom; assessing the rival's CI collection capabilities; testing and managing your firm's vulnerability to the rival's collection methods; developing and implementing aggressive countermeasures (including disinformation); analyzing the results; and integrating this information with data from the CI side of the process, thereby providing management with a more complete intelligence picture of the marketplace (revealing what the competition is trying to collect, for instance, is often an early indicator of where they're headed as a company). A case study is provided. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"53-61"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信